![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
International Journal of Critical Infrastructure Protection, Volume 26
Volume 26, September 2019
- Andres Robles-Durazno
, Naghmeh Moradpoor, James McWhinnie, Gordon Russell
, Inaki Maneru-Marin:
PLC memory attack detection and response in a clean water supply system. - Fei Wang, Xia-zhong Zheng, Nan Li
, Xuesong Shen:
Systemic vulnerability assessment of urban water distribution networks considering failure scenario uncertainty. - Vishrut Kumar Mishra, Venkata Reddy Palleti
, Aditya Mathur:
A modeling framework for critical infrastructure and its application in detecting cyber-attacks on a water distribution system. - Bikash Ranabhat, Joseph Clements, Jacob Gatlin, Kuang-Ting Hsiao, Mark Yampolskiy:
Optimal sabotage attack on composite material parts. - Luigi Sportiello:
"Internet of Smart Cards": A pocket attacks scenario. - Quan Mao, Nan Li
, Feniosky Peña-Mora:
Quality function deployment-based framework for improving the resilience of critical infrastructure systems. - Carlos A. Barreto
, Alvaro A. Cárdenas
, Jennifer S. Holmes, Agustin Palao
, Juan Carlos Restrepo:
A business that can't lose: Investing in attacks against the Colombian power grid. - Finn Erik Landegren, Jonas Johansson, Olof Samuelsson
:
Quality of supply regulations versus societal priorities regarding electricity outage consequences: Case study in a Swedish context. - Melissa Stockman, Dipankar Dwivedi, Reinhard Gentz, Sean Peisert
:
Detecting control system misbehavior by fingerprinting programmable logic controller functionality. - Shengli Liu, Yongtu Liang:
Exploring the temporal structure of time series data for hazardous liquid pipeline incidents based on complex network theory. - Busyairah Syd Ali
:
Traffic management for drones flying in the city. - Choong-Hee Han
, Soon-Tai Park, Sang-Joon Lee:
The Enhanced Security Control model for critical infrastructures with the blocking prioritization process to cyber threats in power system.
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.